
Securing Integrated Transportation Networks
- 1st Edition - May 3, 2024
- Imprint: Elsevier
- Authors: Gary A. Gordon, Richard R. Young
- Language: English
- Paperback ISBN:9 7 8 - 0 - 3 2 3 - 9 5 4 0 9 - 9
- eBook ISBN:9 7 8 - 0 - 3 2 3 - 9 5 4 0 8 - 2
Securing Integrated Transportation Networks provides a comprehensive look at multimodal transportation security—its dynamics, evolving threats, and technology advances that enha… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteSecuring Integrated Transportation Networks provides a comprehensive look at multimodal transportation security—its dynamics, evolving threats, and technology advances that enhance operational security and related infrastructure protection and hardening, as well as the regulatory environment. As threats are evolving, so is the technology used in enhancing transportation security, operational procedures, and regulations. This book addresses this dynamic evolution of transportation security, serving as a primary reference for information on the range of activities and components involved in transportation security. It covers the myriad parts involved in the relationship between, and among, logistics, the supply chains and transportation entities, and more.
In addition, it looks at operations, infrastructure, equipment, laws and regulations, policies and procedures, and risk focused on transportation safety and security by mode and transportation in general. Cooperation and partnering with and among the industry, to include transportation providers and government agencies, is the way forward to ensure that security is maintained and keeps pace with the evolving threat and regulatory landscape.
- Introduces readers to the characteristics of the motive power, freight or passage haulage units, physical infrastructure required, the operating environment itself and the information technology applicable to both operating and managing customer-provider relationships—all of which to foster safe, secure, effective, and efficient operations
- Includes discussion questions and case studies available for assignments and subsequent classroom discussion, whereby real-world scenarios serve to hone analytical abilities
- Discusses the risks and vulnerabilities that various supply chains and associated transportation modes may pose to the ability of a firm to maintain ongoing operations, helping them to analyze trade-offs and mitigate threats
Individuals and organizations in fields such as transportation, manufacturing, logistics and supply chain, transit and passenger transportation, government and commercial security agencies; academia, including research centers; students and instructors in homeland security, supply chain, and transportation studies. Continuing education of multi-modal inspectors
- Cover image
- Title page
- Table of Contents
- Copyright
- Foreword
- Acknowledgments
- Section I. The evolution of transportation security
- Chapter 1. Overview of transportation and why we want to secure it
- Prologue
- 1.1. What is transportation?
- 1.2. Freight transportation
- 1.3. Moving people
- 1.4. Components of transportation
- 1.5. What is transportation infrastructure?
- 1.6. Evolution of transportation modes
- 1.7. Cybersystem dependence
- 1.8. Threats and vulnerabilities overview
- 1.9. Securing transportation infrastructure and operations
- Chapter 2. Transportation security before and after 9/11
- 2.1. Introduction
- 2.2. Transportation security: A little history
- 2.3. Protecting the railroads
- 2.4. Shifts in modal preferences
- 2.5. Intermodalism
- 2.6. Protecting transportation infrastructure
- 2.7. Enhancing initiatives with cross-sector alliances
- 2.8. Summary
- Chapter 3. Federal agencies—Regulation and the promotion of economic growth
- 3.1. Introduction
- 3.2. A complex evolution
- 3.3. Railroads: Where it all began
- 3.4. Motor carriers: Protecting a nascent industry
- 3.5. Transit: A formerly embedded activity
- 3.6. Aviation: Bifurcation of economic and safety regulations
- 3.7. Ocean maritime shipping
- 3.8. Inland maritime shipping
- 3.9. Pipelines
- 3.10. Let's not forget intermodal
- 3.11. Sorting out the federal agencies
- 3.12. Summary
- Appendix A: Compendium of federal transportation-related legislation—1800s
- Appendix B: Compendium of federal transportation-related legislation—1900–1950
- Appendix C: Compendium of federal transportation-related legislation—1951–2000
- Appendix D: Compendium of federal transportation-related legislation—2000+
- Chapter 4. Who are the parties involved and what are their relationships?
- 4.1. Introduction
- 4.2. Modal partners
- 4.3. Cooperative and partnered security programs and initiatives
- 4.4. Summary
- Chapter 5. Components and economics of transportation security
- 5.1. Introduction
- 5.2. The nature of transportation infrastructure
- 5.3. Analysis of benefits
- 5.4. Dictated infrastructure
- 5.5. Safety and security
- 5.6. Transit time
- 5.7. Economic effects and goods
- 5.8. Total cost of ownership: Initial costs and ongoing maintenance expenses
- 5.9. Asset utilization
- 5.10. Mutual aid
- 5.11. Intermodal operations
- 5.12. Adding protective assets
- 5.13. The problem of scale
- 5.14. Determining probability
- 5.15. Summary
- Section II. Exposure
- Chapter 6. Nature of transported people and goods
- 6.1. Introduction
- 6.2. Transporting people
- 6.3. Freight
- 6.4. Modal attributes
- 6.5. Security concerns according to supply chain tier
- 6.6. Summary
- Chapter 7. Threats, vulnerabilities, consequences, and risks
- 7.1. Introduction
- 7.2. Definitions
- 7.3. Transportation infrastructure
- 7.4. Summary
- Chapter 8. Natural versus manmade disasters
- 8.1. Introduction
- 8.2. All-hazards Approach
- 8.3. Developing a common lexicon
- 8.4. Phases of emergencies or incidents
- 8.5. Agencies
- 8.6. Stakeholders
- 8.7. What should transportation organizations and stakeholders do?
- 8.8. Continuous preparedness
- 8.9. Summary
- Appendix A: Short glossary of emergency management terms
- Chapter 9. Assessing risk
- 9.1. Introduction
- 9.2. What are the risks to transportation systems?
- 9.3. Assessing risk
- 9.4. Future assessment needs
- Chapter 10. Cyber threats and risks
- 10.1. Introduction to cybersecurity threats and transportation
- 10.2. How we got to where we are
- 10.3. Modal-specific IT and OT systems
- 10.4. Common threads means common threats
- 10.5. Generic means of protecting from cyberattacks
- 10.6. Artificial intelligence: A solution or another threat?
- 10.7. Summary
- Section III. Transportation modes, interrelationships, and supply chain resilience
- Chapter 11. Highway and motor carrier including shipping and postal transportation
- 11.1. Introduction
- 11.2. Physical components
- 11.3. Operations
- 11.4. Regulations and standards (operations and facilities)
- 11.5. Natural disasters
- 11.6. Manmade disasters
- 11.7. Protection initiatives
- 11.8. Summary
- Chapter 12. Freight, passenger, and commuter rail
- 12.1. Overview of railroad operations
- 12.2. Importance of rail transportation
- 12.3. Overview of railroad infrastructure
- 12.4. Regulations, guidelines, and standards
- 12.5. Security measures and systems
- 12.6. Threats and vulnerabilities
- 12.7. Protection and hardening measures
- 12.8. Summary
- Chapter 13. Bus and rail transit
- 13.1. Introduction
- 13.2. Overview of transit incidents and security
- 13.3. Key definitions
- 13.4. Statistics
- 13.5. Characteristics and operations
- 13.6. Threats and vulnerabilities
- 13.7. Protection and security measures
- 13.8. Summary
- Appendix A
- Chapter 14. Maritime transportation
- 14.1. Introduction to maritime transportation
- 14.2. General operations
- 14.3. Guidelines and standards
- 14.4. Maritime infrastructure components
- 14.5. Vulnerabilities and threats
- 14.6. Risks and consequences
- 14.7. Existing security measures
- 14.8. Future infrastructure protection, resiliency, and hardening
- 14.9. Summary
- Chapter 15. Aviation
- 15.1. Introduction
- 15.2. Commercial passenger aviation
- 15.3. Commercial cargo operations
- 15.4. Charter operations
- 15.5. General aviation
- 15.6. Infrastructure
- 15.7. Regulations and standards
- 15.8. Threats and vulnerabilities
- 15.9. US approach to aviation security
- 15.10. Summary
- Chapter 16. Intermodal versus multimodal transportation
- 16.1. Introduction
- 16.2. Taxonomy of multimodal and intermodal transportation combinations
- 16.3. Infrastructure
- 16.4. Infrastructure requirements
- 16.5. Risks and vulnerabilities
- 16.6. Protective measures
- 16.7. Summary
- Chapter 17. Pipelines
- 17.1. Introduction
- 17.2. Standards
- 17.3. Pipeline infrastructure overview
- 17.4. Petroleum and natural gas pipeline components
- 17.5. Liquid petroleum pipeline components
- 17.6. Natural gas pipeline components
- 17.7. Pipeline system threats, vulnerabilities, and consequences
- 17.8. Pipeline security guidelines
- 17.9. Historical accounts of pipeline disruption
- 17.10. Summary
- Appendix A: Threats, vulnerabilities, and consequences for common, liquid, and natural gas infrastructure tables
- Appendix B: Pipeline security guidelines
- Section IV. What is being done about transportation security?
- Chapter 18. What is being done about transportation security?
- 18.1. Introduction
- 18.2. The divide between transportation service providers and their users
- 18.3. Two different worlds—Public versus private sector initiatives
- 18.4. International collaboration
- 18.5. Summary
- Chapter 19. Physical versus operational security measures
- 19.1. Introduction
- 19.2. Key definitions
- 19.3. What is the relationship between cybersystems and operational and physical security measures?
- 19.4. How do physical and operational security differ, and how are they interrelated?
- 19.5. How are physical and operational security similar and different among transportation modes?
- 19.6. How does the threat environment affect these security measures?
- 19.7. How do policies and practices affect these security measures?
- 19.8. Summary
- Chapter 20. Where do we go from here?
- 20.1. Introduction
- 20.2. Collaboration is key
- 20.3. Information sharing
- 20.4. Awareness of evolving threats
- 20.5. Layered security may be a solution
- 20.6. Research activities
- 20.7. If it were easy, everyone could do it
- 20.8. Concluding thoughts
- Index
- Edition: 1
- Published: May 3, 2024
- Imprint: Elsevier
- No. of pages: 434
- Language: English
- Paperback ISBN: 9780323954099
- eBook ISBN: 9780323954082
GG
Gary A. Gordon
Gary A. Gordon is a Professor of Professional Practice at the University of Massachusetts Lowell. He holds a Ph.D. and B.S in Civil Engineering, and MBA from the University of Massachusetts Lowell, and M.S. in Civil Engineering from the University of Maryland. Prior to academia, Dr. Gordon had a lengthy career in transportation operations, security and infrastructure design and construction, to include in the U.S. Army Reserve. During his career he held positions as Assistant Federal Security Director-Surface Transportation for DHS/Transportation Security Administration and Assistant Chief Engineer-Design & Construction of a former Class I Northeast Railroad. He is a co-editor of Intermodal Maritime Security: Supply Chain Risk Mitigation, co-author of Railway Security: Protecting Against Manmade and Natural Disasters and Securing Integrated Transportation Networks and is on the editorial board of the Journal of Transportation Security.
RY
Richard R. Young
Richard R. Young is Distinguished Professor of Supply Chain Management at The Pennsylvania State University. He holds a B.S. in Operations Management from Rider University, M.B.A. from Albany University, and Ph.D. in Business Logistics from The Pennsylvania State University. Dr. Young is a fellow of the Chartered Institute of Logistics and Transport of the United Kingdom and is accepted to practice before the U.S. Federal Maritime Commission. Prior to academia, he held various supply chain management positions in industry. Dr. Young is on the editorial boards of several leading supply chain journals, a Fulbright German Research Scholar, and he received the 2008 Distinguished Educator Award of the National Défense Transportation Association. He is co-author of the book Railway Security: Protecting Against Manmade and Natural Disasters and co-editor of Intermodal Maritime Security: Supply Chain Risk Mitigation.